/* R FRINGE COMMENTARY:
Here is Pennsylvania's computer crimes law, adopted in 1983 with
changes in 1986, Pennsylvania consolidated statutes title
18 section 3933.*/
SECTION 3933 Unlawful use of a computer
(a) Offense defined.-- A person commits an offense if he:
(1) accesses, alters, damages or destroys any
computer, computer system, computer network, computer
software, computer program or data base or any part
thereof, with the intent to interrupt the normal
functioning of an organization
/*does a person commit a crime by breaking into a
system and cleaning it up if the normal function of the
organization is chaos and devolution?*/
or to devise or execute any scheme or artifice to
defraud or deceive or control property or services by
means of false or fraudulent pretenses,
rep[resentations, or promises;
(2) intentionally and without authorization accesses,
alters, interferes with the operation of, damages or
destroys any computer, computer system, computer
network, computer software, computer program, or
computer data base or any part thereof; or
(3) intentionally or knowingly and without
authorization gives or publishes a password,
identifying code, personal identification number or other
confidential information about a computer, computer
system, computer network or data base.
/*This statute has an extremely elastic definition of the the
term confidential information and gives a very broad tool to the
computer industry. >Consequently label material sold in this
state which is legitimately confidential "confidential
information protected by 18PaC.S Section 3933*/
(b) Grading.--An offense under subsection (a)(1) is a felony
of the third degree. An offense under subsection (a)(2) or (3)
is a a misdemeanor of the first degree.
(c) Definitions.--As used in this section, the following
words and phrases shall have the meanings given to them in this
subsection:
"Access". To intercept, instruct, communicate with, store
data in, retrieve data from or otherwise make use of any
resources of a computer, computer system, computer network or
data base.
"Computer." An electronic, magnetic, optical, hydraulic
/* Will all of those with hydraulic computers PLEASE leave a
message to me explaining what the hell a hydraulic computer
is----- Thanks---- Sysop (Herb Kraft.) */
organic or other high speed data processing device or system
which performs, logic, arithmetic functions and includes all
input, output, processing, storage, software or communication
facilities which are connected or related to the device in a
system or network.
"Computer network" the interconnection of two o more
computers through the usage of satellite, microwave, line or
other communication medium.
"Computer program" an ordered set of instructions or
statements and related data that, when automatically execute in
actual or modified form in a computer system, causes it to
perform specified functions.
"Computer software" a set of computer programs, procedures,
and associated documentation concerned with the operation of a
computer system.]
"Computer system" a set of related, connected or unconnected
computer equipment, devices and software.
"Data base" a representation of information, knowledge,
facts, concepts or instructions which are being prepared or
processed or have been prepared or processed in a formalized
manner and are intended for use in a computer, computer system or
computer network including, but not limited to, computer
printouts, magnetic storage media, punched cards or data stored
internally in the memory of the computer.
"Financial instrument" includes, but is not limited to, any
check, draft, warrant, money order, note, certificate of deposit,
letter of credit, bill of exchange, credit or debit card,
transaction authorization mechanism, marketable security or any
computer system representation thereof.
"Property" includes but is not limited to financial
instruments, computer software and programs either in machine or
human readable form, and anything of value, tangible or
intangible.
"Services" includes but is not limited to, computer time,
data processing and storage functions.
Downloaded From P-80 International Information Systems 304-744-2253